A blockchain-based medical data sharing and protection scheme X Liu, Z Wang, C Jin, F Li, G Li IEEE Access 7, 118943-118953, 2019 | 249 | 2019 |
Practical access control for sensor networks in the context of the Internet of Things F Li, Y Han, C Jin Computer Communications 89, 154-164, 2016 | 137 | 2016 |
Secure and efficient data transmission in the Internet of Things F Li, Z Zheng, C Jin Telecommunication Systems 62, 111-122, 2016 | 95 | 2016 |
Cost-effective and anonymous access control for wireless body area networks F Li, Y Han, C Jin IEEE Systems Journal 12 (1), 747-758, 2016 | 77 | 2016 |
Certificateless online/offline signcryption for the Internet of Things F Li, Y Han, C Jin Wireless Networks 23, 145-158, 2017 | 68 | 2017 |
A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety C Jin, C Xu, X Zhang, F Li Journal of medical systems 40, 1-6, 2016 | 61 | 2016 |
Provably secure heterogeneous access control scheme for wireless body area network AA Omala, AS Mbandu, KD Mutiria, C Jin, F Li Journal of Medical Systems 42, 1-14, 2018 | 58 | 2018 |
A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography C Jin, C Xu, X Zhang, J Zhao Journal of medical systems 39, 1-8, 2015 | 56 | 2015 |
Practical signcryption for secure communication of wireless sensor networks F Li, Y Han, C Jin Wireless Personal Communications 89, 1391-1412, 2016 | 54 | 2016 |
Identity-based deniable authentication for ad hoc networks F Li, P Xiong, C Jin Computing 96 (9), 843-853, 2014 | 46 | 2014 |
An improved two-layer authentication scheme for wireless body area networks X Liu, C Jin, F Li Journal of medical systems 42, 1-14, 2018 | 38 | 2018 |
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme X Zhang, C Xu, C Jin, R Xie, J Zhao Future Generation Computer Systems 36, 180-186, 2014 | 38 | 2014 |
An identity-based proxy re-encryption for data deduplication in cloud G Kan, C Jin, H Zhu, Y Xu, N Liu Journal of systems architecture 121, 102332, 2021 | 25 | 2021 |
Efficient forward secure identity-based shorter signature from lattice X Zhang, C Xu, C Jin, R Xie Computers & Electrical Engineering 40 (6), 1963-1971, 2014 | 25 | 2014 |
Identity-based user authenticated key agreement protocol for multi-server environment with anonymity A Hassan, AA Omala, M Ali, C Jin, F Li Mobile Networks and Applications 24, 890-902, 2019 | 22 | 2019 |
An efficient heterogeneous signcryption for smart grid C Jin, G Chen, C Yu, J Shan, J Zhao, Y Jin PloS one 13 (12), e0208311, 2018 | 22 | 2018 |
Identity-based deniable authenticated encryption and its application to e-mail system F Li, Z Zheng, C Jin Telecommunication Systems 62, 625-639, 2016 | 20 | 2016 |
Certificateless deniably authenticated encryption and its application to e-voting system E Ahene, C Jin, F Li Telecommunication Systems 70 (3), 417-434, 2019 | 17 | 2019 |
Secure fuzzy identity-based public verification for cloud storage Y Xu, C Jin, W Qin, J Shan, Y Jin Journal of Systems Architecture 128, 102558, 2022 | 16 | 2022 |
A heterogeneous user authentication and key establishment for mobile client–server environment F Li, J Wang, Y Zhou, C Jin, SKH Islam Wireless Networks 26, 913-924, 2020 | 14 | 2020 |